2021
DOI: 10.1016/j.ipm.2021.102745
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-enhancing distributed protocol for data aggregation based on blockchain and homomorphic encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…The reason is that the proposed clustering method effectively uses the network's total energy and ulti- That is why nodes consume less energy and have less computational cost as given in [5], [52]. Ropsten environment is used for PoW while Rinkeby is used for PoA [53].…”
Section: Simulation Resultsmentioning
confidence: 99%
“…The reason is that the proposed clustering method effectively uses the network's total energy and ulti- That is why nodes consume less energy and have less computational cost as given in [5], [52]. Ropsten environment is used for PoW while Rinkeby is used for PoA [53].…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Cecchetti et al proposed a system that supports strict confidentiality and high transaction rates for bank intermediary accounts, using a variant of ELGamal-based Confidential Transactions (CT) to hide transaction amounts [18]. [24]. Overall, applying blockchain technology to data sharing in cloud environments has a considerable theoretical basis and research results.…”
Section: Privacy Protection In Blockchainmentioning
confidence: 99%
“…Egueiro et al. proposed an enhanced privacy‐preserving distributed secure data aggregation protocol based on blockchain and homomorphic encryption technologies which is used for data encryption, allowing private aggregation operations, and smart contracts facilitate efficient data aggregation [24].…”
Section: Related Workmentioning
confidence: 99%
“…Another method for sharing and manipulating data without revealing private values is homomorphic encryption [16].A typical example is RSA encryption. Under the modulo operation, the encrypted ciphertext multiplication result can be the same as the plaintext calculation.…”
Section: Homomorphic Encryptionmentioning
confidence: 99%